Let’s go little bit advance to understand other options provided by the SQLMap tool. Sqlmap -u –data=”user=admin&password=admin” -p userĪnother way is to copy the Burp request into a file and pass the same to SQLMap. We can provide the data being passed in the POST request body to scan by the SQLMap tool. ![]() *: Parameter to scan (if -p switch is not provided) POST request ![]() ![]() Let’s look at the basic usage of SQLMap tool on GET and POST requests. In this article, we will see different type of SQLMap commands which may come handy while exploiting different scenarios of SQL injection.įor demo purposes, I am using this machine from Vulnhub.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |